From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Implementation of the Advanced Encryption Standard on a Public-key Crypto-Coprocessor., и . CARDIS, стр. 135-146. USENIX, (2002)Experimental Analysis of the Femtocell Location Verification Techniques., , и . NordSec, том 7127 из Lecture Notes in Computer Science, стр. 49-54. Springer, (2010)On the Complexity of Computing Short Linearly Independent Vectors and Short Bases in a Lattice., и . STOC, стр. 711-720. ACM, (1999)Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform., , , и . TRUST, том 6101 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2010)Hardware-software integrated approaches to defend against software cache-based side channel attacks., , , и . HPCA, стр. 393-404. IEEE Computer Society, (2009)Advances on Access-Driven Cache Attacks on AES., и . Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 147-162. Springer, (2006)Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms., , и . MobiSec, том 17 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 71-82. Springer, (2009)Cheap Hardware Parallelism Implies Cheap Security., и . FDTC, стр. 80-91. IEEE Computer Society, (2007)Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones., , , , , и . PROOFS, том 11 из Kalpa Publications in Computing, стр. 33-48. EasyChair, (2019)Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems., , , , и . NDSS, The Internet Society, (2016)